Analysis
-
max time kernel
140s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
15/07/2024, 22:07
Static task
static1
Behavioral task
behavioral1
Sample
4b9b28be68ec30e447c9988eb8e3570c_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
4b9b28be68ec30e447c9988eb8e3570c_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
4b9b28be68ec30e447c9988eb8e3570c_JaffaCakes118.exe
-
Size
34KB
-
MD5
4b9b28be68ec30e447c9988eb8e3570c
-
SHA1
f55a9973526c20bc08173fa53e2ac4d5b197a76d
-
SHA256
3bbb5fc12885f9174161d43f479eb65dad642ba128eedbe747fd47b781d34773
-
SHA512
40a410a6edf6666c253bc8fe2ed73247e657bc24c2c3bec3b060bd5f666cfb5a2ee7a0cfab3ec9b4c2942dd89fe9eedc5ca5f35bc66239ca60cd45016c08935e
-
SSDEEP
768:Miejqr1sz5nQG34mp1KhT/DbNgDx4JsDst/i9q:MZjqr1sVf3N1KNffjtB
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\ServiceInternet = "C:\\Windows\\internt.exe" 4b9b28be68ec30e447c9988eb8e3570c_JaffaCakes118.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Internt.Exe 4b9b28be68ec30e447c9988eb8e3570c_JaffaCakes118.exe File opened for modification C:\Windows\Internt.Exe 4b9b28be68ec30e447c9988eb8e3570c_JaffaCakes118.exe